Penetration testing bY eXpl0i13r

Saturday, 18 April 2020

Dockers and Containers

›
For years, developer had a challenge setting up development environment with the right configurations of tools as well as time required fo...
1 comment:
Monday, 13 April 2020

LSASS Dumping Methods ( For Mimikatz )

›
In every attack we need to get the windows credentials, this super important task. We need to target "LSASS.EXE" process and dum...
Wednesday, 1 April 2020

Executing Commands via Node.js ( Portable Node.exe )

›
Was exploring Node.js and thought to publish article here on how we can leverage Node.js in pentesting. I saw few articles of Malware...

Document Object Model and DOM XSS

›
DOM (Document Object Model) How many times you saw applications in past where even if you click on some of the buttons or select items fr...
Saturday, 3 August 2019

Remote Shares

›
File Sharing Server on Kali  Download SMBServer.py from following link, https://github.com/SecureAuthCorp/impacket/blob/master/exampl...
Saturday, 28 January 2017

Cryptography Mind Map

›
Hi, Sharing my Crypto Mind Map for quick reference. Download from here Hope this helps!
51 comments:
Friday, 27 January 2017

Office of Foreign Asset Control (OFAC)

›
Office of Foreign Asset Control (OFAC) The Office of Foreign Assets Control (OFAC) is a financial intelligence and enforcement agency of...
1 comment:
›
Home
View web version
Powered by Blogger.